Manuscript without Images
              PLEASE CONSULT LEONARDO JOURNAL 37.3(2004): 211-215
into humans [10] significantly bolstered corporate interest. Applied Digital Solutions, Inc. (ADS)
is marketing external [...
into my hand, this is inter-cut with slow motion flash images of the five hands described
above. The background audio is a...
their own hands upon the photographs. This connection is a form of self-implication. The hand
that reaches out is also the...
Current concern for national security around the world reflects international political tensions
and is one factor that ha...
case) to activate a microchip. Power generated from the transceiver allows the passive
microchip to relay its ID informati...
  In this project I am not becoming a passive subject of others, but remain empowered and
pro-active in the representat...
Upcoming SlideShare
Loading in...5

Manuscript without Images PLEASE CONSULT LEONARDO JOURNAL ...


Published on

Published in: Business, Technology
  • Be the first to comment

  • Be the first to like this

No Downloads
Total Views
On Slideshare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide

Manuscript without Images PLEASE CONSULT LEONARDO JOURNAL ...

  1. 1. Manuscript without Images PLEASE CONSULT LEONARDO JOURNAL 37.3(2004): 211-215 FOR COMPLETE ARTICLE Resisting Surveillance: Identity and Implantable Microchips “Pop! Goes the Weasel”, 2002-2003 an interactive art installation Nancy Nisbet …there is no power relation without the correlative constitution of a field of knowledge, nor any knowledge that does not presuppose and constitute at the same time power relations. Michel Foucault [1] Although surveillance of human behaviour is not new, technological developments and heightened concern over public security are increasingly facilitating, and arguably justifying, ubiquitous surveillance. Leading contenders in contemporary social surveillance systems include: the establishment of national ID cards, the use of biometric identifiers, and potentially, the implantation of identifying microchips. Perhaps the most serious risk to personal privacy and freedom that any of these systems pose is the development of an involuntary and comprehensive centralized or interconnected database. It is in the implementation, the control of access, and the restrictions of use of such information repositories that has many privacy 2 3 advocates concerned [ , ]. The trend toward the convergence of diverse databases of collected information, in North America and elsewhere, recalls Bentham’s ‘Panopticon’ [4] and the spectre of coercion that emerges through Foucault’s analysis of power and knowledge in disciplinary society. My concern with the limits and risks of the explosion of surveillance technologies prompted me to undertake an artistic exploration of a particularly threatening system, that of implanted radio frequency identification microchips. “Pop! Goes the Weasel”, an interactive art installation first presented at the Inter-Society for Electronic Art (ISEA) symposium in Nagoya, Japan in October 2002, is the first of several art works that I have undertaken to this end. 2001-2002: I have two microchips implanted in my body - one in the back of each hand. The first was injected in October 2001 (Fig. 1) and the second in February 2002 [5]. Radio Frequency Identification Technology Since the 1980’s, Radio Frequency Identification Technology (RFID) [6] has developed to a point that today it is widely used in tracking and access applications. It is a wireless system commonly used for livestock and pet identification as well as automated vehicle identification systems such as toll roads and parking garages. RFID technology has the potential to drastically alter human surveillance. As microchips get smaller and power supply issues [7] are resolved, forms of human surveillance that invade the body will increase. Some human bioengineering research in the United Kingdom already uses implanted RFID technology [8]. In October 2002, the United States Federal Drug Administration’s apparent [9] decision that RFID microchips used for non-medical applications do not need FDA approval for implantation
  2. 2. into humans [10] significantly bolstered corporate interest. Applied Digital Solutions, Inc. (ADS) is marketing external [11] human tracking devices such as the wristwatch-like ‘Digital Angel’ and the internal VeriChip™ [12], for “a variety of security, financial, emergency identification and healthcare applications”. 2001: I approached four surgeons and a veterinarian and asked whether or not they would agree to perform the microchip implantation for artistic research purposes. The vet agreed to supply me with the microchip but refused to inject it into me. One surgeon did not reply to my message. The second declined. The third agreed on condition that the Canadian Medical Association would sanction the procedure. The fourth simply agreed. Identity and Microchip Implantation For any surveillance or tracking data to be meaningful it must be associated with a particular person, location, or thing being observed; ultimately it is a process that relies on some form of identification. The dystopic futures of much science fiction are only too familiar with the tracking and controlling of humans through surveillance implants. Such fictions are becoming science and the future is imminent [13,14]. Deciphering and altering the underlying assumptions of a system can enable subversion of that system. Some of the assumptions of identity upon which surveillance relies are: that a person’s identity is singular, that one’s identity is constant and unchanging, that identity has a fundamental connection to the body, and finally, that identity is ascertainable. I had two chips implanted into my body because of the assumption that each surveyed person has one unique ID number – not two: one chip, one person, and one unique code. Surveillance relies on minimizing confusion and keeping one’s boundaries clear. I implanted only two chips because it takes only two to create binary system - like the zeros and ones of computer code. With exactly two chips I am able to ‘code for’ an infinite number of identities just through the sequence in which they are scanned. 2000: Wanting to push further than the spectacle of the implantation of a microchip I struggled to come to a point of departure – to make a bold and playful entrance into a resistance of corporate or government sanctioned surveillance. Pop! Goes the Weasel – Installation details The visible features of this installation are four-fold (Fig. 2). The viewer first encounters one of two electronic RFID library gates that allow entrance into and out of the installation space. Those viewers who choose to wear an RFID microchip badge will be able to unlock the gates while those without a badge will be locked out. A second feature of the dimly lit installation area (see Fig. 3) is the presence of five black circular pedestals. On top of each pedestal is a transparent close-up photograph of a hand against a background of surgical green silk. The five hands (see Fig.4, a-e) resemble those of an elderly woman, a gentleman, a patient, an elegant lady, and a workman. A third visible element is a split screen projection on one wall (see Fig. 5). The top portion is a video loop that shows a surgical implantation of a microchip
  3. 3. into my hand, this is inter-cut with slow motion flash images of the five hands described above. The background audio is an almost unrecognizably warped interpretation of the nursery rhyme ‘Pop! Goes the Weasel’ alternating with a medical sounding ‘beep’. One scanner is programmed to display the badge ID number at the bottom of the projection in real- time. As someone with a badge approaches any of the pedestals, the antenna will detect the badge and identify the unique ID number associated with it. A light in the bottom of the pedestal will be activated to illuminate the photograph. The viewer tracking data (date, time and location) will be automatically collected and stored in a database [15]. 1997: At a dinner party with friends, I was introduced to the use of microchips in tracking fish. The disturbing thought of using such microchips for human surveillance took root in my mind. Pop! Goes the Weasel - Objectives The installation presents issues of surveillance as they relate to identity and the body. It is a site of experimentation of surveillance resistance strategies through possible avoidance, intervention and subversion of the system. When no one was looking a gentleman crawled under the gate. Avoidance: Although the gates suggest restricted access, they are actually ‘leaky’ and allow motivated visitors to discover ways to circumvent the access control. A workman hurried over to the photograph before the light went out. Intervention: A forthcoming component to this installation enables the viewer direct intervention in the surveillance database itself. The small pedestal where the electronics are visible will be the site where the visitor may alter some of the collected information. Each microchip badge is pre-programmed with a unique ID number: this number is associated with a database record that contains other information such as name, occupation, and country of residence. After scanning the badge to open the associated data record, visitors may change the name, occupation and country of residence associated with ‘their’ card. This information remains linked to the card until another visitor adopts the card and changes the associated ‘identity’ yet again. After the others left the installation, an elderly woman quietly altered the database. Subversion: By constantly changing ‘whom’ the data belongs to, identity is blurred (the data is associated with multiple people but with one ID badge) and the collected information becomes meaningless. A lady covertly passed off her badge to another. This installation aims to remind participants of the ubiquity of surveillance structures, encourage visceral responses to potential future modes of surveillance, and allow visitors to practice intervening in and avoiding surveillance as possible forms of resistance. Already significantly conditioned to surveillance and authentication interfaces, visitors routinely placed
  4. 4. their own hands upon the photographs. This connection is a form of self-implication. The hand that reaches out is also the hand surveyed. Whose hand is it? Is it someone you know? Is it someone like you? Could it be you? Further Work I am interested in the interface between the body and interactive informational technologies. Subjection of my body to the cultural coding and technical invasion of implanted microchips is fundamentally different from wearing them as an accessory like a watch or from tattooing numbers on my body. I am interested in embodiment versus adornment. These chips are permanent, non-transferable, hidden, and they ‘talk’ to certain machines. In future work I will use my implanted microchips to interface with my computer and to track my identities as I travel in both physical and cyber spaces. I will reconfigure my computer mouse to also function as an RFID microchip reader/antenna. As I use my computer, the chip in the hand using the mouse is scanned; this initiates the collection of data for my own private database [16]. The chip in my left hand has been arbitrarily associated with my identity at play, while that in my right hand is associated with my identity at work. I am interested in juxtaposing where “I” go inside my computer and cyberspace, with which “I” is going there, and what “I” am doing there. While collecting this ‘virtual’ data, I will also record ‘real world’ observations. Using a GPS (Global Positioning system) unit, I will record my coordinates. I will use a web cam to document my physical surroundings: where am I (is my body) when I go “there” in cyberspace? I want to explore the connections of my physical body and associated identity(ies) to my computer and my virtual identities. I will investigate the nature of my identities and how my perceptions of identity/self may be shifting. The exploration and experimentation with the RFID human computer interface will have significant impact on the project. What is the experience of tracking my every computer encounter? How do I negotiate the conscious decisions to identify with one or another identity (as represented by chip ID number)? How does the performative aspect of use of my system in public spaces such as cyber cafés, libraries, etc, influence the project – my notion of self, my awareness of self? A more public aspect to this future work is to develop a scanner ‘detector’. As RFID technologies become more widely used, I may not be able to determine when my implanted chips are responding to hidden scanners. The scanner detector will ensure that I remain aware of my microchips’ ‘conversations’ with public surveillance devices: the detector will allow me to resist accordingly and play with the performative potential of such knowledge. Conclusion Tracking and identification systems are rapidly being developed: RFID technology is one of the forerunners of ubiquitous surveillance. I am interested in provoking questions about these authentication systems: How is identity ascertained/ maintained? What are the hidden risks? Will chipping become mandatory? How will these systems be implemented? Who will have or control access to the information? What are the weaknesses that resistance can explore? “Pop! Goes the Weasel” aims to encourage resistance of surveillance structures by blurring viewer identities, avoiding access control mechanisms, and by direct intervention in the database. My on-going work will closely examine my personal microchip interface with the computer and playfully consider the resulting data with respect to my body and my perception of self.
  5. 5. Current concern for national security around the world reflects international political tensions and is one factor that has done much to bolster support for increased human surveillance and brought such identification technologies to the forefront of discussion. It may be too late to prevent such pervasive and invasive technical developments but it is not too late to demand protection for individual privacy and freedom. For all the benefits that may be brought by all of the digital ‘angels’ being developed, there runs the very real risk of their becoming the twenty- first century’s all too watchful big brothers. Acknowledgements Special thanks is given to: Grant Gregson, programming; David Floren, electronics; Jackie Seo, makeup FX; Rob Bos and Marina Roy, video and photography assistants; and to my friends and colleagues who offered their support. Nancy Nisbet is an artist and assistant professor in the Department of Art History, Visual Art and Theory at the University of British Columbia in Vancouver, Canada. References and Notes 1 Foucault, M, Discipline and Punish: The Birth of the Prison (New York: Pantheon, tr. by Alan Sheridan of Surveiller et Punir: Naissance de la prison. Paris: Gallimard, 1975) p.27 2 Ramesh, Elaine M, “Time Enough? Consequences of Human Microchip Implantation” 3 Crews, C.W., “Human Bar Code Monitoring Biometric Technologies in a Free Society”, Cato Institute Policy Analysis, No. 452, 1-20, September 17, 2002. 4 Bentham, Jeremy. "Panopticon Papers." A Bentham Reader. Ed. Mary Peter Mack. New York: Pegasus, 1969. 194-208. The Panopticon of Jeremy Bentham is a circular architectural model designed in 1791. The essence of its power is that it allows seeing without being seen. 5 Scheeres, J. “New Body Art: Chip Implants”, March 11, 2002,1284,50769,00.html “A Canadian artist has implanted microchips in her hands in a quest to explore the relationship between identity and technology in an era when life is increasingly regulated by gadgets and machines.” 6 An RFID system is comprised of three parts: an antenna, a reader (transceiver), and a unique radio frequency microchip (transponder or RF tag). The system works when the reader sends a pulse to the antenna that emits radio signals of a specific frequency (134kHz in this
  6. 6. case) to activate a microchip. Power generated from the transceiver allows the passive microchip to relay its ID information back to the reader and positively identify the object or individual. 7 Currently, RFID microchips used in animals, and in a few people, are passive (have no power supply) and reading of the ID number can only occur at a maximum distance of about 5 feet. If these microchips could be powered and still remain small enough for implantation, it would enable tracking over larger distances. 8 Professor Kevin Warwick of the Cybernetic Intelligence Research Group at the University of Reading in the UK has been used microchip implants in his bioengineering research on interfacing with the nervous system via RFID. 9 It is noteworthy that subsequent to the ADS press release, the FDA issued a warning letter to ADS Inc. on November 8, 2002, indicating that in marketing the chip for medical benefit, “the VeriChip is adulterated … or misbranded” under the Federal Food, Drug, and Cosmetic Act. This points to conflicting statements issued by ADS to the media and to the FDA – one wonders why ADS feels this ‘misbranding’ is necessary. One must also question the FDA’s ostensible lack of concern over the implantation of such a device into humans for any reason. 10 ADSX Press Release, October, 22, 2002 announcing the FDA’s permission to use implanted microchips for “security, financial and personal identification or safety applications”. 11 “The Digital Angel Safety and Location Systems surpass ordinary location-enabled devices. Only Digital Angel alerts you to the exact location of people, pets and objects in real time.” 12 ADSX Press Release, October 31, 2002 announcing the use of VeriChip™ for the above mentioned (see ref. 10) purposes including “healthcare applications”. 13 Wilson, J. “Girl to get tracker implant to ease parents' fears”, September 3, 2002,3604,785071,00.html 14 May 10, 2002, “Fla. Family Takes Computer Chip Trip” 15 The functioning of the installation occurs primarily behind the scenes. The surveillance system designed for this installation consists of eight antennae, two RFID readers, and many RFID microchip badges. Five of the antennae are contained within the photograph pedestals; two are visible at the gates, and the eighth antenna is visible through the transparent top to a sixth, shorter, pedestal that is located beside the computer and RFID system box (Fig. 2).
  7. 7. 16 In this project I am not becoming a passive subject of others, but remain empowered and pro-active in the representation and interpretation of my identity(ies).